Vulnerability Description
Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. It is patched in versions 1.0.4, 1.1.3 and 1.2.5.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Faye Project | Faye | < 1.0.4 |
Related Weaknesses (CWE)
References
- https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30ePatchThird Party Advisory
- https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5ExploitMitigationThird Party Advisory
- https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30ePatchThird Party Advisory
- https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5ExploitMitigationThird Party Advisory
FAQ
What is CVE-2020-11020?
CVE-2020-11020 is a vulnerability with a CVSS score of 8.5 (HIGH). Faye (NPM, RubyGem) versions greater than 0.5.0 and before 1.0.4, 1.1.3 and 1.2.5, has the potential for authentication bypass in the extension system. The vulnerability allows any client to bypass ch...
How severe is CVE-2020-11020?
CVE-2020-11020 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-11020?
Check the references section above for vendor advisories and patch information. Affected products include: Faye Project Faye.